This advisory documents a vulnerability in Arista EOS for security ACL bypass. The issue allows a security ACL drop rule to be bypassed if a NAT ACL rule filter with permit action matches the packet flow. This could enable incorrect forwarding of packets that should have been denied by the Security ACL, potentially allowing an ACL bypass. The issue was discovered internally by Arista.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center